13.7.Identification and Authentication (IA) 185
IA-1 Identification and Authentication Policy and Procedures (H) 185
IA-2 User Identification and Authentication (L) (M) (H) 186
IA-2 (1) Control Enhancement (L) (M) (H) 187
IA-2 (2) Control Enhancement (M) (H) 187
IA-2 (3) Control Enhancement (M) (H) 188
IA-2 (4) Control Enhancement (H) 189
IA-2 (5) Control Enhancement (M) (H) 189
IA-2 (8) Control Enhancement (M) (H) 190
IA-2 (9) Control Enhancement (H) 191
IA-2 (11) Control Enhancement (M) (H) 191
IA-2 (12) Control Enhancement (L) (M) (H) 192
IA-3 Device Identification and Authentication (M) (H) 193
IA-4 Identifier Management (H) 194
IA-4 (4) Control Enhancement (M) (H) 195
IA-5 Authenticator Management (H) 196
IA-5 (1) Control Enhancement (H) 198
IA-5 (2) Control Enhancement (M) (H) 199
IA-5 (3) Control Enhancement (M) (H) 200
IA-5 (4) Control Enhancement (H) 201
IA-5 (6) Control Enhancement (M) (H) 202
IA-5 (7) Control Enhancement (M) (H) 202
IA-5 (8) Control Enhancement (H) 203
IA-5 (11) Control Enhancement (L) (M) (H) 204
IA-5 (13) Control Enhancement (H) 205
IA-6 Authenticator Feedback (L) (M) (H) 205
IA-7 Cryptographic Module Authentication (L) (M) (H) 206
IA-8 Identification and Authentication (Non-Organizational Users) (L) (M) (H) 207
IA-8 (1) Control Enhancement (L) (M) (H) 208
IA-8 (2) Control Enhancement (L) (M) (H) 208
IA-8 (3) Control Enhancement (L) (M) (H) 209
IA-8 (4) Control Enhancement (L) (M) (H) 210
Share with your friends: |